Search

Showing total 13,688 results

Search Constraints

Start Over You searched for: Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
13,688 results

Search Results

551. Systematic Methods of Constructing Bent Functions and 2-Rotation Symmetric Bent Functions.

552. Tight Information Theoretic Converse Results for Some Pliable Index Coding Problems.

553. Blind Phaseless Short-Time Fourier Transform Recovery.

554. Distance Distribution in Reed-Solomon Codes.

555. Constant-Gap-to-Capacity and Generalized Degrees of Freedom Regions of the MIMO MAC-IC-MAC.

556. The Capacity Achieving Distribution for the Amplitude Constrained Additive Gaussian Channel: An Upper Bound on the Number of Mass Points.

557. Optimization of Heterogeneous Coded Caching.

558. An Index Coding Approach to Caching With Uncoded Cache Placement.

559. Asymptotic Gilbert–Varshamov Bound on Frequency Hopping Sequences.

560. Explicit Constructions of MSR Codes for Clustered Distributed Storage: The Rack-Aware Storage Model.

561. Bounds and Optimal $q$ -Ary Codes Derived From the $\mathbb{Z}_qR$ -Cyclic Codes.

562. Rigorous Dynamics of Expectation-Propagation-Based Signal Recovery from Unitarily Invariant Measurements.

563. Construction of Optimal Locally Repairable Codes via Automorphism Groups of Rational Function Fields.

564. PIR Schemes With Small Download Complexity and Low Storage Requirements.

565. Structured Local Optima in Sparse Blind Deconvolution.

566. Coded Caching With Distributed Storage.

567. Optimum Overflow Thresholds in Variable-Length Source Coding Allowing Non-Vanishing Error Probability.

568. Low-Mean Hitting Time for Random Walks on Heterogeneous Networks.

569. Routeing Properties in a Gibbsian Model for Highly Dense Multihop Networks.

570. Generalized Compression Strategy for the Downlink Cloud Radio Access Network.

571. Maximal Ferrers Diagram Codes: Constructions and Genericity Considerations.

572. PIR Array Codes With Optimal Virtual Server Rate.

573. Universal Tree Source Coding Using Grammar-Based Compression.

574. Detection Under One-Bit Messaging Over Adaptive Networks.

575. High Dimensional Inference With Random Maximum A-Posteriori Perturbations.

576. Quantum Versus Classical Simultaneity in Communication Complexity.

577. On the Sub-Packetization Size and the Repair Bandwidth of Reed-Solomon Codes.

578. New Extension Constructions of Optimal Frequency-Hopping Sequence Sets.

579. New Constructions of MDS Euclidean Self-Dual Codes From GRS Codes and Extended GRS Codes.

580. Convex-Split and Hypothesis Testing Approach to One-Shot Quantum Measurement Compression and Randomness Extraction.

581. On the Derivative Imbalance and Ambiguity of Functions.

582. Codes for Graph Erasures.

583. The Capacity of Gaussian Multi-User Channels With State and Feedback.

584. Successive Coding in Multiuser Information Theory.

585. Coding for the Feedback Gel'fand-Pinsker Channel and the Feedforward Wyner-Ziv Source.

586. Achieving 1/2 log(1+SNR) on the AWGN Channel With Lattice Encoding and Decoding.

587. Paving the Way for Consensus: Convergence of Block Gossip Algorithms.

588. Lower Bounds for Maximally Recoverable Tensor Codes and Higher Order MDS Codes.

589. State-Dependent Symbol-Wise Decode and Forward Codes Over Multihop Relay Networks.

590. SLOPE for Sparse Linear Regression: Asymptotics and Optimal Regularization.

591. Topological Interference Management With Confidential Messages.

592. Secret Key-Enabled Authenticated-Capacity Region, Part—II: Typical-Authentication.

593. Coded Caching With Full Heterogeneity: Exact Capacity of the Two-User/Two-File Case.

594. Finite-Bit Quantization for Distributed Algorithms With Linear Convergence.

595. Duality Between Source Coding With Quantum Side Information and Classical-Quantum Channel Coding.

596. Simple Coding Techniques for Many-Hop Relaying.

597. Nonlinearity and Kernel of Z-Linear Simplex and MacDonald Codes.

598. Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication.

599. Construction of Expurgated and Extended Goppa Codes With Dihedral Automorphism Groups.

600. Data Deduplication With Random Substitutions.